locked
一天蓝屏重启五次,有人可以帮忙看一下原因吗? RRS feed

  • 问题

  • 正常使用不会蓝屏待机蓝屏

    这是错误文件

    https://1drv.ms/u/s!Ak4_9s8KGBatqCNz7UHWkYRZl-f1?e=LtwWUX

    Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\92894\Desktop\041721-10046-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: srv*
    Executable search path is: 
    Windows 10 Kernel Version 19041 MP (8 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
    Machine Name:
    Kernel base = 0xfffff804`2e600000 PsLoadedModuleList = 0xfffff804`2f22a3d0
    Debug session time: Sat Apr 17 10:12:49.516 2021 (UTC + 8:00)
    System Uptime: 0 days 5:25:12.257
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ................................................................
    ............................................
    Loading User Symbols
    Loading unloaded module list
    ............
    For analysis of this file, run !analyze -v
    nt!KeBugCheckEx:
    fffff804`2e9f5e40 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffb087`6518e340=000000000000001e
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff8042e961472, The address that the exception occurred at
    Arg3: 0000000000000001, Parameter 0 of the exception
    Arg4: 0000000000000001, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    KEY_VALUES_STRING: 1
    
        Key  : Analysis.CPU.mSec
        Value: 3640
    
        Key  : Analysis.DebugAnalysisManager
        Value: Create
    
        Key  : Analysis.Elapsed.mSec
        Value: 83953
    
        Key  : Analysis.Init.CPU.mSec
        Value: 562
    
        Key  : Analysis.Init.Elapsed.mSec
        Value: 107762
    
        Key  : Analysis.Memory.CommitPeak.Mb
        Value: 78
    
        Key  : WER.OS.Branch
        Value: vb_release
    
        Key  : WER.OS.Timestamp
        Value: 2019-12-06T14:06:00Z
    
        Key  : WER.OS.Version
        Value: 10.0.19041.1
    
    
    BUGCHECK_CODE:  1e
    
    BUGCHECK_P1: ffffffffc0000005
    
    BUGCHECK_P2: fffff8042e961472
    
    BUGCHECK_P3: 1
    
    BUGCHECK_P4: 1
    
    WRITE_ADDRESS: fffff8042f2fb390: Unable to get MiVisibleState
    Unable to get NonPagedPoolStart
    Unable to get NonPagedPoolEnd
    Unable to get PagedPoolStart
    Unable to get PagedPoolEnd
    unable to get nt!MmSpecialPagesInUse
     0000000000000001 
    
    EXCEPTION_PARAMETER1:  0000000000000001
    
    EXCEPTION_PARAMETER2:  0000000000000001
    
    CUSTOMER_CRASH_COUNT:  1
    
    PROCESS_NAME:  SearchProtocolHost.exe
    
    TRAP_FRAME:  ffff800000000000 -- (.trap 0xffff800000000000)
    Unable to read trap frame at ffff8000`00000000
    
    STACK_TEXT:  
    ffffb087`6518e338 fffff804`2ea9177f     : 00000000`0000001e ffffffff`c0000005 fffff804`2e961472 00000000`00000001 : nt!KeBugCheckEx
    ffffb087`6518e340 fffff804`2ea07eac     : 00000000`00001000 ffffb087`6518ebe0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166d1f
    ffffb087`6518ea00 fffff804`2ea04043     : 00000001`444d1d00 ffffb087`6518edd0 00000000`00000000 ffffb087`6518edd4 : nt!KiExceptionDispatch+0x12c
    ffffb087`6518ebe0 fffff804`2e961472     : fffff804`2ec226d1 ffffc787`49f1adb0 ffff988e`a0891b10 00000000`00000000 : nt!KiPageFault+0x443
    ffffb087`6518ed78 ffffc787`49f1ad01     : fffff804`00000075 00000000`00000000 ffffc787`5e08f01a 00020019`00000000 : nt!RtlpHpVaMgrRangeCreate+0x8a
    ffffb087`6518edb8 fffff804`00000075     : 00000000`00000000 ffffc787`5e08f01a 00020019`00000000 00000000`00000000 : 0xffffc787`49f1ad01
    ffffb087`6518edc0 00000000`00000000     : ffffc787`5e08f01a 00020019`00000000 00000000`00000000 ffffc788`00000068 : 0xfffff804`00000075
    
    
    SYMBOL_NAME:  nt!RtlpHpVaMgrRangeCreate+8a
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    IMAGE_VERSION:  10.0.19041.928
    
    STACK_COMMAND:  .thread ; .cxr ; kb
    
    BUCKET_ID_FUNC_OFFSET:  8a
    
    FAILURE_BUCKET_ID:  0x1E_c0000005_W_nt!RtlpHpVaMgrRangeCreate
    
    OS_VERSION:  10.0.19041.1
    
    BUILDLAB_STR:  vb_release
    
    OSPLATFORM_TYPE:  x64
    
    OSNAME:  Windows 10
    
    FAILURE_ID_HASH:  {d1601d81-c7ef-e127-203f-b02d7d74b78e}
    
    Followup:     MachineOwner
    ---------

    2021年4月17日 3:55

答案

  • 你好,

    是的,看您的系统版本,IMAGE_VERSION: 10.0.19041.928,应该是win10 2004的版本,似乎也安装了最新的安全更新。

    根据栈的信息来看,360Hvm64+0x1b5b2,stornvme!ScsiToNVMe+0x1ff。

    这是一个内核的错误,可能有关于360这个软件和stornvme.sys文件(这通常似乎是一个驱动程序NVME driver)。

    1.建议您先完全卸载360软件。

    2.到厂商的官网下载安装主板芯片组的驱动程序。

    然后看是否正常。

    如果回答是有帮助的请将其标记为答案可以帮助其他有相同问题的社区成员并快速找到有用的答复。


    针对Windows 2008/2008R2的扩展支持将于2020年结束,之后微软将不再为其提供安全更新。点击此处或扫描二维码获取《在 Azure 上运行 Windows Server 的终极指南》,把握良机完成云迁移并实现业务现代化。

    2021年4月19日 2:59

全部回复

  • 发错地方了,这是win10
    2021年4月17日 3:59
  • 你好,

    是的,看您的系统版本,IMAGE_VERSION: 10.0.19041.928,应该是win10 2004的版本,似乎也安装了最新的安全更新。

    根据栈的信息来看,360Hvm64+0x1b5b2,stornvme!ScsiToNVMe+0x1ff。

    这是一个内核的错误,可能有关于360这个软件和stornvme.sys文件(这通常似乎是一个驱动程序NVME driver)。

    1.建议您先完全卸载360软件。

    2.到厂商的官网下载安装主板芯片组的驱动程序。

    然后看是否正常。

    如果回答是有帮助的请将其标记为答案可以帮助其他有相同问题的社区成员并快速找到有用的答复。


    针对Windows 2008/2008R2的扩展支持将于2020年结束,之后微软将不再为其提供安全更新。点击此处或扫描二维码获取《在 Azure 上运行 Windows Server 的终极指南》,把握良机完成云迁移并实现业务现代化。

    2021年4月19日 2:59
  • 又蓝屏了QAQ

    Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\042121-8656-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff803`42600000 PsLoadedModuleList = 0xfffff803`4322a3d0 Debug session time: Wed Apr 21 03:00:31.341 2021 (UTC + 8:00) System Uptime: 0 days 14:03:15.162 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................................... Loading User Symbols Loading unloaded module list ............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff803`429f5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb581`b4f0e570=000000000000003b 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80342d0667e, Address of the instruction which caused the bugcheck Arg3: ffffb581b4f0ee70, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2593 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 47425 Key : Analysis.Init.CPU.mSec Value: 280 Key : Analysis.Init.Elapsed.mSec Value: 3611 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80342d0667e BUGCHECK_P3: ffffb581b4f0ee70 BUGCHECK_P4: 0 CONTEXT: ffffb581b4f0ee70 -- (.cxr 0xffffb581b4f0ee70) rax=fffffffffffffffd rbx=ffff9501ba5e7778 rcx=fffffffffffffffd rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9501ba8ed040 rip=fffff80342d0667e rsp=ffffb581b4f0f870 rbp=0000000000000001 r8=00000000ffffffff r9=7fff9501ba5e7778 r10=7ffffffffffffffc r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=ffff9501ba5e7340 r15=0000000000000001 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!PspExitThread+0x1de: fffff803`42d0667e 0f8551321400 jne nt!PspExitThread+0x143435 (fffff803`42e498d5) [br=0] Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: smartscreen.exe STACK_TEXT: ffffb581`b4f0f870 fffff803`42d098e3 : 00000000`00000000 ffff9501`c5fd0d00 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x1de ffffb581`b4f0f970 fffff803`42d0986a : 00000000`00000000 00000000`00000000 ffff9501`ba8ed040 ffff9501`c5fd0d60 : nt!PspTerminateThreadByPointer+0x53 ffffb581`b4f0f9b0 fffff803`42a077b5 : 00000000`00000000 ffff9501`ba8ed040 ffffb581`b4f0fa80 ffff9501`00000000 : nt!NtTerminateThread+0x4a ffffb581`b4f0fa00 00007ff9`fd24d784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000009a`2127f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`fd24d784 SYMBOL_NAME: nt!PspExitThread+1de MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.928 STACK_COMMAND: .cxr 0xffffb581b4f0ee70 ; kb BUCKET_ID_FUNC_OFFSET: 1de FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PspExitThread OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {fc141b8c-59ff-5af7-581c-6f8cabfdb0e1} Followup: MachineOwner ---------

    2021年4月21日 4:29